Nation-state cyber attacks could lead to cyber conflict

Nation-state cyber attacks could lead to cyber conflict

New HP-sponsored report finds significant increase in nation-states targeting enterprises to steal high-value IP. Image: iStock/CROCOTHERY A new report from HP released Thursday, Nation States, Cyberconflict and the Web of Profit, found that nation-state cyber attacks are “moving us closer to a point of advanced cyber conflict.” “Nation-state conflict doesn’t take place in a vacuum; as evidenced by the fact enterprise is the most common victim within those attacks analyzed,” Ian Pratt, global head of…

Read More

Armed Conflict Draws Closer as State-Backed Cyber-Attacks Intensify

Armed Conflict Draws Closer as State-Backed Cyber-Attacks Intensify

The world is coming perilously close to nation states retaliating against cyber-attacks with conventional weapons, according to a new HP report. The study, Nation States, Cyberconflict and the Web of Profit, was compiled by University of Surrey senior lecturer in criminology, Mike McGuire, from publicly available reports into state-sponsored attacks and interviews with scores of experts. It claimed there has been a 100% increase in “significant” state-backed attacks between 2017-20, and an average of over…

Read More

Why Nine’s Move to an IP Media Fabric Solution is the Future of Broadcasting – Cisco Blogs

Why Nine’s Move to an IP Media Fabric Solution is the Future of Broadcasting – Cisco Blogs

In the broadcasting space, the competition and need to differentiate is intense. Content is being distributed as quickly as it is produced, and web and app-based channels are powered by high-end smartphones and ever-increasing bandwidth, changing the competitive landscape for traditional broadcasters. The migration of broadcast technology to IP infrastructure is well underway. Nine, a leading free-to-air television network in Australia that broadcasts news, sports, and lifestyle & entertainment content, recognized the need to adapt…

Read More

ACC Launches Data Security Program for Law Firms

ACC Launches Data Security Program for Law Firms

The legal industry’s first comprehensive data security evaluation and accreditation program has been launched today. The Data Steward Program (DSP), which has been developed by the Association of Corporate Counsel (ACC), will enable quick assessments and comparisons of law firms’ data security standards by prospective clients. The ACC said the program has been introduced in light of growing concerns from both law firms and their clients regarding the safety of the highly sensitive data being…

Read More

Number of US Breach Victims Jumps 564% in Q1 2021

Number of US Breach Victims Jumps 564% in Q1 2021

The number of publicly reported breach victims in the US has soared by 564% from the end of 2020 to the first three months of this year, according to the latest data from the Identity Theft Resource Center (ITRC). The non-profit claimed that 51 million consumers were affected by incidents in Q1 2021, versus eight million in the final three months of 2020. However, the volume of breaches only rose by 12%, or 363, over…

Read More

Italian Arrested After Paying Hitman to Murder Ex-Girlfriend

Italian Arrested After Paying Hitman to Murder Ex-Girlfriend

Europol has revealed the arrest of an Italian national suspected of paying for a hitman via a dedicated dark web site. The unnamed suspect reportedly paid €10,000 in Bitcoin to have their ex-girlfriend murdered. They visited a website hosted on the TOR network which advertised assassination services. Europol said its European Cybercrime Centre (EC3) and Joint Cybercrime Action Taskforce (J-CAT) assisted the Italian Postal and Communication Police (Polizia Postale e delle Comunicazioni) in the operation….

Read More

Get Involved with Docker – Docker Blog

Get Involved with Docker – Docker Blog

Every day, hundreds of passionate Docker users around the world contribute to Docker. Whether you are just getting started or are an expert in your field, there are many ways to get involved and start contributing to Docker. If you’re into technical writing, you can easily publish and/or edit articles in docs.docker.com. If you’re more into code contribution, there are dozens of open source Docker projects you can dive into. Or if you’re just interested…

Read More

New report reveals collaboration platform security risks

New report reveals collaboration platform security risks

New report reveals collaboration platform security risks | 2021-04-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Taking a DIY approach to cybersecurity is a dangerous proposition

Taking a DIY approach to cybersecurity is a dangerous proposition

Taking a DIY approach to cybersecurity is a dangerous proposition | 2021-04-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Integrity: How It’s More than Just Data Security and FIM

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security circles up until now. Let’s take a look at the security industry more broadly. In most conversations dealing with integrity, data security and File Integrity Monitoring (FIM) controls often end…

Read More
1 3,665 3,666 3,667 3,668 3,669 3,768